Skip to main content
guest
Join
|
Help
|
Sign In
ITGS-mx
Home
guest
|
Join
|
Help
|
Sign In
Wiki Home
Projects
Recent Changes
Pages and Files
Members
Discussion
ITGS-mx
Home
Strand 1: Social and ethical significance
1.1
Reliability and integrity
1.2
Security
1.3
Privacy and anonymity
1.4
Intellectual Property
1.5
Authenticity
1.6
Digital divide and equality of access
1.7
Surveillance
1.8
Globalization and cultural diversity
1.9
Policies
1.10
Standards and protocols
1.11
People and machines
1.12
Digital citizenship
Strand 2: Application to specified scenarios
2.1
Business and Employment
2.2
Education and Training
2.3
Environment
2.4
Health
2.5
Home and Leisure
2.6
Politics and government
Strand 3: IT Systems
3.1 -
Hardware
3.2 -
Software
3.3 -
Networks
3.4 -
Internet
3.5 -
Personal and Public Communications
3.6 -
Multimedia and Digital Media
3.7 -
Databases
3.8 -
Spreadsheets, modelling and simulations
3.9 -
Introduction to project management
HL Extension
3.10 -
IT systems in organizations
3.11 -
Robotics, artificial intelligence and expert systems
3.12 -
Case Study 2012
3.13 -
4 elements analysis
Extra Topics and important information.
4.1
Command Terms
4.3
Campus Party
4.2
Mock Questions
4.4
EXAM 1
4.5
CES 2011
4.6
Review Championship
Project
5.1
Paper 1 Database Question
(Team 1)
Teachers
6.1
Teaching Resources
Favorites
20
All Pages
20
Menu
20
Add
Add "All Pages"
Done
Networks
Edit
24
…
1
Tags
network security privacy anonymity
Notify
RSS
Backlinks
Source
Print
Export (PDF)
This is the first Unit we are covering from the ITGS syllabus. The main subtopics to cover are:
What is a network? Uses of a network
Network equipment
Types of cables.
Firewalls
NIC's
Routers
Switches / Hubs
Servers / Clients
Types of networks
Intranets / Extranets
WAN, LAN, WLAN
VPNs
Wireless networks
How WiFi Networks Work
Types of Wireless connections
Acess Points
WiFi NICs
War Driving
Security issues
Viruses
Antiviruses
Spyware
Trojans
Worms
Scareware
Botnets
Keyloggers
Phishing
Pharming
Brute Force Attack
Denial of Service Attack
Rainbow Tables
Hackers and crackers
Wireless security protocol (WEP).
WPA
Authentication and its purpouse in networks
Login
Username and password
Robery of identities
Encryption
What is Encryption
Encryption methods
Public Key method
E-commerce (the use of networks in the business area of impact)
What is e-commerce
B2B
B2C
B2E
C2C
Payment Systems
This are the Wikinotebook elements for this topic:
Key Terms
News Items
Areas of Impact Analysis
Diagrams
Exam Questions
Readings summaries
Javascript Required
You need to enable Javascript in your browser to edit pages.
help on how to format text
Turn off "Getting Started"
Home
...
Loading...
This are the Wikinotebook elements for this topic:
Key Terms
News Items
Areas of Impact Analysis
Diagrams
Exam Questions
Readings summaries